Category: Security

On top of using “private browsing” or “incognito” mode, check out Tor to keep your presence anonymous over the Internet pipelines. You can definitely use an anonymizer site, but the interface of Tor is way better. Tor offers an installer bundle or a “just-copy-and-execute” bundle. I’ve been using it...

I’ve noticed the update failing more often for about a month … googling it mentioned that it was due to Avira’s server being overwhelmed. So I was patient, updated manually each time, but it just became too tedious — tried this command, too, after reading it from a moderator...

I’ve known about grc.com for a long time, but just today visited the site again after a while. Steve Gibson is like Tiger Woods when it comes to security. So, if you’re into this kind of stuff like me, need tools, or just want to become more knowledgeable in...

Here’s an interesting article on the Seattle Times website about a small plug-in device that Microsoft “quietly distributed to a handful of law-enforcement agencies.” Dubbed the COFFEE (Computer Online Forensic Evidence Extractor), it contains “150 commands that can dramatically cut the time it takes to gather digital evidence, which...

I read an article wherein researchers from Princeton University cooled down memory to -58 degrees F which allowed them to examine the encrypted contents of the memory for as long as 10 minutes. Microsoft, however, says its unlikely. To be clear, encrypted data here is data that gets encrypted...